Data Commun and Compt Network Ch.1
Data Commun and Compt Network Ch.1
1
Data communication and computer network
Data communications refers to the transmission of the digital
data between two or more computers and a computer network
or data network is a telecommunications network that allows
computers to exchange data.
Computer network is a system of interconnected computers
and computerized peripherals such as printers. This
interconnection among computers facilitates information
sharing among them. Computers may connect to each other by
either wired or wireless media. The best-known computer
network is the Internet.
Why we studying the computer network?
Because the computer network is the basic communication
way to exchange information in all aspects.
2
Network Architecture
Computer networks can be discriminated into various types
such as Client-Server, peer-to-peer or hybrid, depending upon
its architecture.
There can be one or more systems acting as Server. Other
being Client, requests the Server to serve requests. Server
takes and processes request on behalf of Clients.
Two systems can be connected Point-to-Point, or in back-to-
back fashion.
They both reside at the same level and called peers.
There can be hybrid network which involves network
architecture of both the above types.
3
Types of Computer Networks, Classification and
its Application
Computer networks are classified based on various factors. They
includes:
Geographical span
Inter-connectivity
Administration
Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
It may be spanned across your table, among Bluetooth enabled devices,
Ranging not more than few meters.
It may be spanned across a whole building, including intermediate
devices to connect all floors.
It may be spanned across a whole city.
It may be spanned across multiple cities or provinces.
4
It may be one network covering whole world.
Inter-Connectivity
14
Cryptograph
Repeater
Hub
Bridge
Switch
Router
Gateway
Network interface card (NIC)
17
Cont’…
A. Repeater is a physical layer device used to interconnect the media
segments of an extended network.
The major function is receive signals form one network segment
and amplify, retime, and retransmit those signals to another
network segment. This process prevents signal deterioration caused
by long cable lengths and large number of connected devices.
It is incapable of performing complex filtering and other traffic
processing.
In addition, all electrical signals, including electrical disturbance
and other errors are repeated and amplified.
It connect segments with different physical media such as UTP and
coaxial cable. But, it can’t connect different network architectures
such as Ethernet and Token ring
18
Cont’…
B. Hub:- A Hub is a physical layer device that connects multiple user
stations, each via a dedicated cable.
Another name for hub is a concentrator.
Hubs do not have any processing Power, it is just a box where you
plug cables, and works in half-duplex manner.
Electrical interconnections are established inside the hub.
Hubs are also used as a multiport repeater.
They are cheap and are not intelligent. Physically similar to
switches and logically similar to repeaters.
Active hubs regenerate a signal before forwarding it to all the ports
on the device and requires a power supply.
Regeneration of the signal aside, the basic function of a hub is to
take data from one of the connected devices and forward it to all the
other ports on the hub.
19
C. Bridges:- Bridges are data communication devices that operate at
layer 2, (data-link layer).
They use to connect two LAN segments.
They forward frames, but do not forward noise or collisions.
Bridges learn addresses by using source address to learn the location of computers.
So they are intelligent devices. They understand frames.
A bridge functions by blocking or forwarding data, based on the destination MAC
address written into each frame of data.
If the destination MAC address is on a network other than that from which the data
was received, it can forward the data to the other networks to which it is connected.
20
If the address is not on the other side of the bridge, the data is
blocked from passing. Today, network switches have largely replaced
bridges.
A bridge is a Layer 2 device used to divide, or segment, a network.
A bridge is capable of collecting and selectively passing data
frames between two network segments. Bridges do this by learning
the MAC address of all devices on each connected segment. Using
this information, the bridge builds a bridging table and forwards or
blocks traffic based on that table. This results in smaller collision
domains and greater network efficiency. Bridges do NOT restrict
broadcast traffic.
21
D. Switches:- Switches are communication devices operating at data-
link layer.
They are physically similar to hubs, but logically similar to bridges.
They operate on frames; understand addresses and only forward when
necessary.
Switches are far more efficient than hubs and are far more desirable for
today’s network environments.
They permit separate pairs of computers to communicate at the same time.
Usually work in full-duplex and higher cost than hubs. A switch forwards
data only to the port on which the destination system is connected.
It looks at the MAC addresses of the devices connected to it to determine
the correct port. By forwarding data only to the system to which the data is
addressed, the switch decreases the amount of traffic on each network link
dramatically.
Switch acts like a hub, but unlike the hub, it examines the destination MAC
addresses of the packet to decide where the packet should be forwarded.
22
Cont’…
Unlike routers that uses network address to make routing decisions, it
uses MAC addresses.
Another name for switch is an intelligent hub.
Ethernet networks used to be built using repeaters.
When the performance of these networks began to suffer because too
many devices shared the same segment, network engineers added
bridges to create multiple collision domains.
As networks grew in size and complexity, the bridge evolved into the
modern switch, allowing micro segmentation of the network.
Today’s networks typically are built using switches and routers, often
with the routing and switching function in the same device.
Ethernet is fundamentally a shared technology where all users on a
given LAN segment compete for the same available bandwidth.
The introduction of hubs into a network resulted in more users
competing for the same bandwidth. Collisions are a by-product of23
E. Router:- Router is a processor that connects two networks and whose primary
function is to relay data form one network to the other on its route form the source
to the destination end system.
Router is an intermediate system used to connect two networks they may or may
not be similar.
The basic requirement for a router is that it must have at least two network
interfaces.
If they are LAN interfaces, the router can manage and route the information
between two LAN segments.
More commonly, a router is used to provide connectivity across wide area
networks.
The router employs an internet protocol (IP) present in each router and each end
systems of the network. 3 addresses of the networks that are directly connected to
the local interfaces and network paths learned from neighboring routers.
24
Cont’…
The router operates at layer 3 (network layer) of the OSI model.
If they are LAN interfaces, the router can manage and route the
information between two LAN segments.
More commonly, a router is used to provide connectivity across
wide area networks.
The router employs an internet protocol (IP) present in each
router and each end systems of the network.
The router operates at layer 3 (network layer) of the OSI model.
A router is a Layer 3 device. Used to “route” traffic between
two or more Layer 3 networks.
Routers make decisions based on groups of network addresses,
or classes, as opposed to individual Layer 2 MAC addresses.
Routers use routing tables to record the Layer 25
F. Gateways:- Two dissimilar networks can be connected by means of a
gateway.
For example, a mainframe can be connected and accessible to a PC
network by means of a gateway.
Unlike routers, a gateway converts the format of data sent between two
networks.
A router adds only addressing information to the data packet.
A router that can route data from an IPX network to an IP network is,
technically, a gateway.
But a gateway has to identify the protocols used in the networks, and
recognize the data format, and convert the message format into
suitable format to be accepted by the other network.
WANs often use gateways because there are a large number of
dissimilar networks present in a WAN.
Gateway provides good connectivity to different kinds of networks
on the Internet. They operate at the layers above the network layer
of the OSI model. 26
G. Network interface card (NIC):-NICs are installed in a
computer to allow it to communicate with a network. They
provide a transparent interface between the network and the
computer.
The computer gives the NIC a message for another
networked device and the NIC formats that message for
transport over the media.
Also, the NIC receives messages from the network and
reformats them so that the computer can understand.
Every NIC card has a unique address burnt into the card;
which is a 6 byte address with two parts.
The first group of numbers is unique for card manufacturers,
and the rest is assigned by the manufacturer. This physical
address is referred to as the MAC address. NICs operate at
the physical & data-link layer of the OSI model. 27
Network topology
A Network Topology is the arrangement with which computer systems
or network devices are connected to each other.
Topologies may define both physical and logical aspect of the
network. Both logical and physical topologies could be same or
different in a same network.
Bus Topology
In case of Bus topology, all devices share single communication line or
cable.
Bus topology may have problem while multiple hosts sending data at
the same time.
Therefore, Bus topology either uses CSMA/CD technology or
recognizes one host as Bus Master to solve the issue.
It is one of the simple forms of networking where a failure of a device
does not affect the other devices. But failure of the shared
communication line can make all other devices stop functioning. 28
Cont’…
Both ends of the shared channel have line terminator. The data is sent
in only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as
hub device, using a point-to-point connection. That is, there exists a
point to point connection between hosts and hub. The hub device can
be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway 29
As in Bus topology, hub acts as single point of failure. If hub fails,
connectivity of all hosts to all other hosts fails. Every
communication between hosts, takes place through only the hub.
Star topology is not expensive as to connect one more host, only one
cable is required and configuration is simple.
30
Ring Topology
In ring topology, each host machine connects to exactly two other
machines, creating a circular network structure.
When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate
hosts.
To connect one more host in the existing structure, the administrator
may need only one more extra cable.
Failure of any host results in failure of the whole ring. Thus, every
connection in the ring is a point of failure. There are methods which
employ one more backup ring.
31
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.
This topology has hosts in point-to-point connection with every other
host or may also have hosts which are in point-to-point connection to
few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do
not have direct point-to-point links.
Mesh technology comes into two types:
32
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently.
This topology imitates as extended Star topology and inherits properties of bus
topology.
This topology divides the network in to multiple levels/layers of network. Mainly
in LANs, a network is bifurcated into three types of network devices.
The lowermost is access-layer where computers are attached.
The middle layer is known as distribution layer, which works as mediator
between upper layer and lower layer.
The highest layer is known as core layer, and is central point of the network, i.e.
root of the tree from which all nodes fork. All neighboring hosts have point-to-
point connection between them.
Similar to the Bus topology, if the root goes down, then the entire network suffers
even. Though it is not the single point of failure. Every connection serves as point
of failure, failing of which divides the network into unreachable segment.
33
Hybrid Topology
A network structure whose design contains more than hybrid
topology.
Hybrid topology inherits merits and demerits of all the
incorporating topologies. T
he above picture represents an arbitrarily hybrid topology.
The combining topologies may contain attributes of Star, Ring,
Bus, and Daisy-chain topologies.
Most WANs are connected by means of Dual-Ring topology and
networks connected to them are mostly Star topology networks.
Internet is the best example of largest Hybrid topology.
34
Network software
The first computer networks were designed with the hardware
as the main concern and the software as an afterthought.
This strategy no longer works.
Network software is now highly structured depending on the
network architecture.
Protocol is the main network software which used to guide the
network.
Protocols works on session layer and above.
Protocols
A protocol is a set of rules that govern data communications.
– The purpose of network protocols
A protocol defines what is communicated,
How it is communicated, and when it is communicated.
35
– The key elements of a protocol are syntax, semantics, and timing.
Some popular protocols
TCP/IP
UDP
ICMP (Internet Control Message Protocol )=network
diagnostic and error reporting protocol
SMTP
(DHCP) Dynamic Host Configuration Protocol
HTTP
FTP
36
OSI Model
Open System Interconnect is an open standard for all
communication systems.
OSI model is established by International Standard Organization
(ISO).
This model has seven layers:
37
Cont’…
Application Layer: This layer is responsible for providing interface to the
application user. This layer encompasses protocols which directly interact with the
user.
Presentation Layer: This layer defines how data in the native format of remote
host should be presented in the native format of host.
Session Layer: This layer maintains sessions between remote hosts. For example,
once user/password authentication is done, the remote host maintains this session
for a while and does not ask for authentication again in that time span.
Transport Layer: This layer is responsible for end-to-end delivery between hosts.
Network Layer: This layer is responsible for address assignment and uniquely
addressing hosts in a network.
Data Link Layer: This layer is responsible for reading and writing data from and
onto the line. Link errors are detected at this layer.
Physical Layer: This layer defines the hardware, cabling wiring, power output,
pulse rate etc.
38
Internet (TCP/IP) Model
Internet uses TCP/IP protocol suite, also known as Internet suite.
This defines Internet Model which contains four layered architecture.
OSI Model is general communication model but Internet Model is
what the internet uses for all its communication.
The internet is independent of its underlying network architecture so
is its Model.
This model has the following layers:
39
Internet (TCP/IP) Model
Application Layer: This layer defines the protocol which enables
user to interact with the network. For example, FTP, HTTP etc.
Transport Layer: This layer defines how data should flow
between hosts. Major protocol at this layer is Transmission
Control Protocol (TCP). This layer ensures data delivered between
hosts is in-order and is responsible for end-to-end delivery.
Internet Layer: Internet Protocol (IP) works on this layer. This
layer facilitates host addressing and recognition. This layer
defines routing.
Link Layer: This layer provides mechanism of sending and
receiving actual data. Unlike its OSI Model counterpart, this layer
is independent of underlying network architecture and hardware.
40